PHOENIX CONTACT Emalytics Controller ILC Incorrect Permission Assignment For Critical Resource (CVE-2020-8768)

critical Tenable OT Security Plugin ID 502678

Synopsis

The remote OT asset is affected by a vulnerability.

Description

An issue was discovered on Phoenix Contact Emalytics Controller ILC 2050 BI before 1.2.3 and BI-L before 1.2.3 devices. There is an insecure mechanism for read and write access to the configuration of the device. The mechanism can be discovered by examining a link on the website of the device.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Phoenix Contact strongly recommends affected users update to engineering software Emalytics v1.2.3 or higher and recommission the controllers. The updated version is available on the vendor's product page.

Please see advisory number VDE-2020-001 from CERT@VDE for more information.

See Also

https://cert.vde.com/de-de/advisories/vde-2020-001

https://www.us-cert.gov/ics/advisories/icsa-20-063-02

Plugin Details

Severity: Critical

ID: 502678

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 11/24/2024

Updated: 11/24/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-8768

CVSS v3

Risk Factor: Critical

Base Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Vulnerability Information

CPE: cpe:/o:phoenixcontact:ilc_2050_bi-l_firmware, cpe:/o:phoenixcontact:ilc_2050_bi_firmware

Required KB Items: Tenable.ot/PhoenixContact

Exploit Ease: No known exploits are available

Patch Publication Date: 2/17/2020

Vulnerability Publication Date: 2/17/2020

Reference Information

CVE: CVE-2020-8768

CWE: 732